CVE-2026-5331
Received Received - Intake
Path Traversal in OpenCart 4.1.0.3 Extension Installer (Remote

Publication date: 2026-04-02

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was determined in OpenCart 4.1.0.3. This affects an unknown part of the file installer.php of the component Extension Installer Page. Executing a manipulation can lead to path traversal. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
opencart opencart 4.1.0.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in OpenCart version 4.1.0.3, specifically in the installer.php file of the Extension Installer Page component. It allows an attacker to perform a path traversal attack by manipulating input, which can be exploited remotely.

Path traversal vulnerabilities enable attackers to access files and directories that are outside the intended directory, potentially leading to unauthorized file access or modification.

The exploit for this vulnerability has been publicly disclosed, and the vendor did not respond to early notifications about it.


How can this vulnerability impact me? :

Exploiting this vulnerability can lead to unauthorized access to files on the server, potentially allowing an attacker to write arbitrary files or execute remote code.

This can compromise the integrity and confidentiality of the system, leading to data breaches, service disruption, or full system compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the vulnerability in OpenCart 4.1.0.3 affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart